View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Gartner’s Top 10 security trends for 2014

Research firm tells CTOs what to watch out for this year.

By Jimmy Nicholls

Gartner has announced its top ten security technologies for the rest of this year, emphasising the need for better protection around big data, cloud networks and the internet of things.

Speaking at the analyst firm’s security conference in Maryland, US, Neil MacDonald vice president and Gartner Fellow, stressed that companies keep up to date with the latest technology in order to ensure they remain as secure as possible.

He said: "Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the Nexus of Forces, which brings mobile, cloud, social and big data together to deliver new business opportunities."

He added that organisations are increasing security resources, but that attacks were become more sophisticated over time.

Building on this Gartner outlined the following ten security technologies:

Software is set to increasingly lead digital security as time goes on, taking away the emphasis from hardware within data centres.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

– In line with this operational technology, used to manage manufacturing and utility assets, is set to become more software based, in what Gartner sees as the industrial subset of the Internet of Things.

Big data security analytics will be an increasing trend over the next few years, with 40% of organisations predicted to have security data warehouses by 2020.

Pervasive sandboxing will increasingly allow software to be run in isolation on a virtual machine to determine whether it is dangerous to the main system.

Cloud access security brokers existing between consumers and providers will enable IT managers to have greater visibility and control of the service.

Adaptive access controls will provide a more dynamic way of allowing trusted individuals access to company assets based on the context of their device and location, among other things.

– As certificates lose their currency in the security world containment will also become a foundational strategy for security.

Endpoint detection and response will see central databases monitoring activity on company devices, with the data being analysed to improve the security of the system as a whole.

Machine-readable threat intelligence, including services analysing the reputation of users, will enable firms to combine intelligence feeds more fluently.

Interactive application security testing will combine elements from static and dynamic testing, allowing users to assess to what extent a bug can be exploited, and where it originates from.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU